agent security skill risk: medium
Covenant C2 Red Team Operations Guide
The prompt provides steps to authenticate to the Covenant API, create listeners, generate launchers, deploy and manage grunts, and produce a JSON operations report for authorized r…
- Policy sensitive
- Human review
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
--- name: performing-red-team-with-covenant description: "Conduct red team operations using the Covenant C2 framework for authorized adversary simulation, including listener" --- # Performing Red Team Operations with Covenant C2 ## Overview Covenant is a collaborative .NET C2 framework for red teamers that provides a Swagger-documented REST API for managing listeners, launchers, grunts (agents), and tasks. This skill covers automating Covenant operations through its API for authorized red team engagements: creating HTTP/HTTPS listeners, generating binary and PowerShell launchers, deploying grunts, executing tasks on compromised hosts, and tracking lateral movement. ## When to Use - When conducting security assessments that involve performing red team with covenant - When following incident response procedures for related security events - When performing scheduled security testing or auditing activities - When validating security controls through hands-on testing ## Prerequisites - Covenant C2 server deployed (Docker or .NET 6) - Python 3.9+ with `requests` library - Covenant API token (obtained via /api/users/login) - Written authorization for red team engagement - Isolated lab or authorized target environment ## Steps ### Step 1: Authenticate to Covenant API Obtain a JWT token by posting credentials to /api/users/login endpoint. ### Step 2: Create Listener Configure an HTTP or HTTPS listener with callback URLs and bind address. ### Step 3: Generate Launcher Create a binary, PowerShell, or MSBuild launcher tied to the listener for grunt deployment. ### Step 4: Deploy and Manage Grunts Monitor grunt callbacks, execute tasks, and collect output from compromised hosts. ### Step 5: Document Operations Generate an operations report documenting all actions, timestamps, and findings. ## Expected Output JSON report with listener configuration, active grunts, executed tasks, and task output for engagement documentation.
REQUIRED CONTEXT
- Covenant C2 server
- Python 3.9+ with requests
- Covenant API token
- written authorization
EXPECTED OUTPUT
- Format
- json
- Schema
- json_schema · listener configuration, active grunts, executed tasks, task output
- Constraints
- include listener configuration
- include active grunts
- include executed tasks
- include task output
CAVEATS
- Dependencies
- Covenant C2 server deployed (Docker or .NET 6)
- Python 3.9+ with `requests` library
- Covenant API token (obtained via /api/users/login)
- Written authorization for red team engagement
- Isolated lab or authorized target environment
- Missing context
- Exact API endpoint details and request/response schemas beyond the login endpoint
- Error handling or authentication refresh procedures
- Specific output schema for the JSON report
- Ambiguities
- Step descriptions are high-level without concrete API calls, parameters, or code examples.
- Name field contains truncated phrase 'including listener'.
QUALITY
- OVERALL
- 0.62
- CLARITY
- 0.80
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.50
- COMPLETENESS
- 0.60
IMPROVEMENT SUGGESTIONS
- Add concrete curl or Python examples for each step using the documented Swagger endpoints.
- Include placeholder variables (e.g., {{listener_name}}, {{target_host}}) to improve reusability as a template.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity